Security of networks and computer systems
Course: Applied Programming
Structural unit: Faculty of information Technology
Title
Security of networks and computer systems
Code
ОК 18
Module type
Обов’язкова дисципліна для ОП
Educational cycle
First
Year of study when the component is delivered
2023/2024
Semester/trimester when the component is delivered
4 Semester
Number of ECTS credits allocated
4
Learning outcomes
Know the basics of building the Windows operating system, the main functions of the operating system protection subsystem, methods and methods of protection against destructive software, methods and parameters of identification, authentication, authorization, registration, auditing in the Windows operating system, the possibilities of delimiting access to OS resources.
Know the functions of network screens, the peculiarities of their functioning; basic concepts and functions of virtual secure networks, VPN security tools. Know cryptographic methods of information protection. Be able to develop a model of an information security threat, ensure confidentiality, availability of information based on the access demarcation system, grant access rights to users, conduct registration and audit.
Form of study
Full-time form
Prerequisites and co-requisites
Know the basics of algorithmization; concept of information system; basic concepts of the Internet. To be able to use basic knowledge to build algorithms that would ensure the solution of the tasks; perform practical and laboratory work, prepare and defend them; to formalize the execution and protection of independent works. Possess elementary skills of finding the necessary information for studying the discipline, use the e-learning system, knowledge assessment system and testing.
Course content
The discipline is aimed at studying the basics of building information protection systems, as well as students' acquisition of competencies in the development, implementation, and operation of protected computer systems with the optimal choice of protection means. The program covers the study of basic methods and means of information protection, their creation, implementation and operation.
Recommended or required reading and other learning resources/tools
1. Cyber security: modern protection technologies. Study guide / S.E. Ostapov, S.P. Yevseev, O.G. King. Lviv: Novy svit-2000, 2021. – 678 p.
2. Babalo Yu.Ya. Information security: a tutorial. Lviv: Lviv Polytechnic Publishing House, 2019. - 580 p.
3. Bogush V.M. Basics of cyberspace, cyber security and cyber defense. Tutorial. K.: Lira-K Publishing House, 2020. - 554 p.
4. Yevseyev S.P. Cyber Security: Cryptography with Python. Tutorial. - Kharkiv. - "New World-2000" Publishing House, 2021. - 120 p.
Planned learning activities and teaching methods
Lectures, laboratory classes, independent work
Assessment methods and criteria
The level of achievement of all planned learning outcomes is determined by the results of defense of laboratory work and individual tasks of independent work. Semester assessment of students is carried out during the semester for all types of work. The total score is formed as a weighted sum of points earned by the student for various types of work. The maximum number of points that a student can receive for work in a semester does not exceed 100 points. The final assessment form is an exam. The results of students' educational activities are evaluated on a 100-point scale. The work in the semester consists of two content modules, at the end of the study of each of which, after completion of the relevant topics, CW1, CW2 are conducted in the form of a written test with open questions. Before conducting control works, group consultations are held on the material of the relevant content module in order to generalize the studied material. The final exam - a maximum of 40 points.
Language of instruction
Ukrainian
Lecturers
This discipline is taught by the following teachers
Departments
The following departments are involved in teaching the above discipline